So, I am working on a case in which the user is getting random bugchecks related to File System. I asked him to run the Driver Verifier as well but it failed on catching any bad drivers. The user's system crashed only twice during a whole week only but it did not reveal any specific information as well. So, I requested him a complete memory Dump file which can be found over **HERE**.
Now, in this complete dump file, the bug check is the NTFS_FILE_SYSTEM (24). Below is a stack trace -
Now, we know that the Second & Third Parameter would be Exception Record & Context Record if NTFSExceptionFilter is present on the stack but as we can see, it is not there and still WINDbg has utilized the second and thirds parameter and provided me with the below output -
So, WinDBG is doing something wrong here? Since, the NTFSExceptionFilter is not available on the stack?
Now, I read the below thread as well -
https://www.sysnative.com/forums/bs...tion]-debugging-an-ntfs_file_system-dump.html
I am at the same condition Patrick was at in the post
I hope someone is able to help me out on this one ^_^
Code:
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: [COLOR=#0000FF]ffffd0002040eae8[/COLOR]
Arg3: [COLOR=#FF0000]ffffd0002040e2f0[/COLOR]
Arg4: fffff801541540bb
Now, in this complete dump file, the bug check is the NTFS_FILE_SYSTEM (24). Below is a stack trace -
Code:
2: kd> k
Child-SP RetAddr Call Site
ffffd000`2040d918 fffff801`5420b9a5 nt!KeBugCheckEx
ffffd000`2040d920 fffff801`54203ea1 Ntfs+0xa9a5
ffffd000`2040dae0 fffff800`22fbad56 Ntfs+0x2ea1
ffffd000`2040db20 fffff801`5420c462 nt!_C_specific_handler+0x86
ffffd000`2040db90 fffff800`22fd31ed Ntfs+0xb462
ffffd000`2040dbc0 fffff800`22f603a5 nt!RtlpExecuteHandlerForException+0xd
ffffd000`2040dbf0 fffff800`22f5f25f nt!RtlDispatchException+0x1a5
ffffd000`2040e2c0 fffff800`22fd78c2 nt!KiDispatchException+0x61f
ffffd000`2040e9b0 fffff800`22fd6014 nt!KiExceptionDispatch+0xc2
ffffd000`2040eb90 fffff801`541540bb nt!KiPageFault+0x214
ffffd000`2040ed20 fffff801`54151302 fltmgr!FltpSetUpIrpCallControl+0x5b
ffffd000`2040ed70 fffff800`22eb1a8a fltmgr!FltpPreFsFilterOperation+0x352
ffffd000`2040ee40 fffff800`2328f978 nt!FsFilterPerformCallbacks+0x12a
ffffd000`2040ee90 fffff800`22f8603a nt!FsRtlAcquireFileForCcFlushEx+0xec
ffffd000`2040f140 fffff800`22ef0ac7 nt!MmFlushSection+0xce
ffffd000`2040f200 fffff800`22f7ea51 nt!CcFlushCachePriv+0x68f
ffffd000`2040f310 fffff801`542a7f04 nt!CcFlushCache+0x11
ffffd000`2040f350 fffff801`5432d1a2 Ntfs+0xa6f04
ffffd000`2040f3d0 fffff801`54229c10 Ntfs+0x12c1a2
ffffd000`2040f520 fffff801`5421effd Ntfs+0x28c10
ffffd000`2040f5c0 fffff801`5421f36c Ntfs+0x1dffd
ffffd000`2040f760 fffff801`5414ecf8 Ntfs+0x1e36c
ffffd000`2040f810 fffff801`5414d0b6 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x258
ffffd000`2040f8b0 fffff800`23252c9a fltmgr!FltpDispatch+0xb6
ffffd000`2040f910 fffff800`22fd74b3 nt!NtReadFile+0x7ca
ffffd000`2040fa90 00007fff`c69d16da nt!KiSystemServiceCopyEnd+0x13
00000078`7cc9d628 00000000`00000000 0x00007fff`c69d16da
Now, we know that the Second & Third Parameter would be Exception Record & Context Record if NTFSExceptionFilter is present on the stack but as we can see, it is not there and still WINDbg has utilized the second and thirds parameter and provided me with the below output -
Code:
EXCEPTION_RECORD: ffffd0002040eae8 -- (.exr 0x[COLOR=#0000FF]ffffd0002040eae8[/COLOR])
ExceptionAddress: fffff801541540bb (fltmgr!FltpSetUpIrpCallControl+0x000000000000005b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000040000028
Attempt to read from address 0000000040000028
CONTEXT: ffffd0002040e2f0 -- (.cxr 0x[COLOR=#FF0000]ffffd0002040e2f0[/COLOR];r)
rax=ffffe0000f4887f0 rbx=ffffe000114efdb8 rcx=0000000000000000
rdx=ffffe000098a2770 rsi=ffffe000098a2770 rdi=0000000040000000
rip=fffff801541540bb rsp=ffffd0002040ed20 rbp=ffffd0002040ed00
r8=ffffd0002040edd8 r9=00000000000000fb r10=ffffe0000fd1c270
r11=7ffffffffffffffc r12=00000000000000fb r13=ffffe00010187a80
r14=ffffd0002040edd8 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
fltmgr!FltpSetUpIrpCallControl+0x5b:
fffff801`541540bb 488b4f28 mov rcx,qword ptr [rdi+28h] ds:002b:00000000`40000028=????????????????
Last set context:
rax=ffffe0000f4887f0 rbx=ffffe000114efdb8 rcx=0000000000000000
rdx=ffffe000098a2770 rsi=ffffe000098a2770 rdi=0000000040000000
rip=fffff801541540bb rsp=ffffd0002040ed20 rbp=ffffd0002040ed00
r8=ffffd0002040edd8 r9=00000000000000fb r10=ffffe0000fd1c270
r11=7ffffffffffffffc r12=00000000000000fb r13=ffffe00010187a80
r14=ffffd0002040edd8 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
fltmgr!FltpSetUpIrpCallControl+0x5b:
fffff801`541540bb 488b4f28 mov rcx,qword ptr [rdi+28h] ds:002b:00000000`40000028=????????????????
Now, I read the below thread as well -
https://www.sysnative.com/forums/bs...tion]-debugging-an-ntfs_file_system-dump.html
I am at the same condition Patrick was at in the post

I hope someone is able to help me out on this one ^_^